Sign-in logs in Azure Active Directory - Microsoft Entra (2023)

  • Article
  • 8 minutes to read

Reviewing sign-in errors and patterns provides valuable insight into how your users access applications and services. The sign-in logs provided by Azure Active Directory (Azure AD) are a powerful type of activity log that IT administrators can analyze. This article explains how to access and utilize the sign-in logs.

Two other activity logs are also available to help monitor the health of your tenant:

  • Audit – Information about changes applied to your tenant, such as users and group management or updates applied to your tenant’s resources.
  • Provisioning – Activities performed by a provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.

What can you do with sign-in logs?

You can use the sign-ins log to find answers to questions like:

  • What is the sign-in pattern of a user?

  • How many users have signed in over a week?

  • What’s the status of these sign-ins?

How do you access the sign-in logs?

You can always access your own sign-ins history at https://mysignins.microsoft.com.

To access the sign-ins log for a tenant, you must have one of the following roles:

(Video) Microsoft Entra: Azure Active Directory Authentication Strengths explained

  • Global Administrator
  • Security Administrator
  • Security Reader
  • Global Reader
  • Reports Reader

The sign-in activity report is available in all editions of Azure AD. If you have an Azure Active Directory P1 or P2 license, you can access the sign-in activity report through the Microsoft Graph API. See Getting started with Azure Active Directory Premium to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.

To access the Azure AD sign-ins log:

  1. Sign in to the Azure portal using the appropriate least privileged role.

  2. Go to Azure Active Directory > Sign-ins log.

    Sign-in logs in Azure Active Directory - Microsoft Entra (1)

You can also access the sign-in logs from the following areas of Azure AD:

  • Users
  • Groups
  • Enterprise applications

View the sign-ins log

To more effectively view the sign-ins log, spend a few moments customizing the view for your needs. You can specify what columns to include and filter the data to narrow things down.

Customize the layout

The sign-ins log has a default view, but you can customize the view using over 30 column options.

  1. Select Columns from the menu at the top of the log.
  2. Select the columns you want to view and select the Save button at the bottom of the window.

Sign-in logs in Azure Active Directory - Microsoft Entra (2)

Filter the results

Filtering the sign-ins log is a helpful way to quickly find logs that match a specific scenario. For example, you could filter the list to only view sign-ins that occurred in a specific geographic location, from a specific operating system, or from a specific type of credential.

(Video) Microsoft Entra / Azure AD 2 0 Explained with Full Demo

Some filter options prompt you to select more options. Follow the prompts to make the selection you need for the filter. You can add multiple filters.

Select the Add filters option from the top of the table to get started.

Sign-in logs in Azure Active Directory - Microsoft Entra (3)

There are several filter options to choose from. Below are some notable options and details.

  • User: The user principal name (UPN) of the user in question.
  • Status: Options are Success, Failure, and Interrupted.
  • Resource: The name of the service used for the sign-in.
  • Conditional access: The status of the Conditional Access (CA) policy. Options are:
    • Not applied: No policy applied to the user and application during sign-in.
    • Success: One or more CA policies applied to the user and application (but not necessarily the other conditions) during sign-in.
    • Failure: The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
  • IP addresses: There is no definitive connection between an IP address and where the computer with that address is physically located. Mobile providers and VPNs issue IP addresses from central pools that are often far from where the client device is actually used. Currently, converting IP address to a physical location is a best effort based on traces, registry data, reverse lookups and other information.

The following table provides the options and descriptions for the Client app filter option.

Note

Due to privacy commitments, Azure AD does not populate this field to the home tenant in the case of a cross-tenant scenario.

NameModern authenticationDescription
Authenticated SMTPUsed by POP and IMAP client's to send email messages.
AutodiscoverUsed by Outlook and EAS clients to find and connect to mailboxes in Exchange Online.
Exchange ActiveSyncThis filter shows all sign-in attempts where the EAS protocol has been attempted.
BrowserSign-in logs in Azure Active Directory - Microsoft Entra (4)Shows all sign-in attempts from users using web browsers
Exchange ActiveSyncShows all sign-in attempts from users with client apps using Exchange ActiveSync to connect to Exchange Online
Exchange Online PowerShellUsed to connect to Exchange Online with remote PowerShell. If you block basic authentication for Exchange Online PowerShell, you need to use the Exchange Online PowerShell module to connect. For instructions, see Connect to Exchange Online PowerShell using multi-factor authentication.
Exchange Web ServicesA programming interface that's used by Outlook, Outlook for Mac, and third-party apps.
IMAP4A legacy mail client using IMAP to retrieve email.
MAPI over HTTPUsed by Outlook 2010 and later.
Mobile apps and desktop clientsSign-in logs in Azure Active Directory - Microsoft Entra (5)Shows all sign-in attempts from users using mobile apps and desktop clients.
Offline Address BookA copy of address list collections that are downloaded and used by Outlook.
Outlook Anywhere (RPC over HTTP)Used by Outlook 2016 and earlier.
Outlook ServiceUsed by the Mail and Calendar app for Windows 10.
POP3A legacy mail client using POP3 to retrieve email.
Reporting Web ServicesUsed to retrieve report data in Exchange Online.
Other clientsShows all sign-in attempts from users where the client app isn't included or unknown.

Analyze the sign-in logs

Now that your sign-in logs table is formatted appropriately, you can more effectively analyze the data. Some common scenarios are described here, but they aren't the only ways to analyze sign-in data. Further analysis and retention of sign-in data can be accomplished by exporting the logs to other tools.

Sign-in error codes

If a sign-in failed, you can get more information about the reason in the Basic info section of the related log item. The error code and associated failure reason appear in the details. Because of the complexity of some Azure AD environments, we cannot document every possible error code and resolution. Some errors may require submitting a support request to resolve the issue.

(Video) Microsoft Entra - What’s new in Identity and Authentication!

Sign-in logs in Azure Active Directory - Microsoft Entra (6)

For a list of error codes related to Azure AD authentication and authorization, see the Azure AD authentication and authorization error codes article. In some cases, the sign-in error lookup tool may provide remediation steps. Enter the Error code provided in the sign-in log details into the tool and select the Submit button.

Sign-in logs in Azure Active Directory - Microsoft Entra (7)

Authentication details

The Authentication Details tab in the details of a sign-in log provides the following information for each authentication attempt:

  • A list of authentication policies applied, such as Conditional Access or Security Defaults.
  • A list of session lifetime policies applied, such as Sign-in frequency or Remember MFA.
  • The sequence of authentication methods used to sign-in.
  • If the authentication attempt was successful and the reason why.

This information allows you to troubleshoot each step in a user’s sign-in. Use these details to track:

  • The volume of sign-ins protected by MFA.
  • The reason for the authentication prompt, based on the session lifetime policies.
  • Usage and success rates for each authentication method.
  • Usage of passwordless authentication methods, such as Passwordless Phone Sign-in, FIDO2, and Windows Hello for Business.
  • How frequently authentication requirements are satisfied by token claims, such as when users aren't interactively prompted to enter a password or enter an SMS OTP.

While viewing the sign-ins log, select a sign-in event, and then select the Authentication Details tab.

Sign-in logs in Azure Active Directory - Microsoft Entra (8)

When analyzing authentication details, take note of the following details:

  • OATH verification code is logged as the authentication method for both OATH hardware and software tokens (such as the Microsoft Authenticator app).
  • The Authentication details tab can initially show incomplete or inaccurate data until log information is fully aggregated. Known examples include:
    • A satisfied by claim in the token message is incorrectly displayed when sign-in events are initially logged.
    • The Primary authentication row isn't initially logged.
  • If you're unsure of a detail in the logs, gather the Request ID and Correlation ID to use for further analyzing or troubleshooting.

Sign-in data used by other services

Sign-in data is used by several services in Azure to monitor risky sign-ins and provide insight into application usage.

Risky sign-in data in Azure AD Identity Protection

Sign-in log data visualization that relates to risky sign-ins is available in the Azure AD Identity Protection overview, which uses the following data:

(Video) Azure Active Directory (AD, AAD) Tutorial | Identity and Access Management Service

  • Risky users
  • Risky user sign-ins
  • Risky service principals
  • Risky service principal sign-ins

For more information about the Azure AD Identity Protection tools, see the Azure AD Identity Protection overview.

Sign-in logs in Azure Active Directory - Microsoft Entra (9)

Azure AD application and authentication sign-in activity

To view application-specific sign-in data, go to Azure AD and select Usage & insights from the Monitoring section. These reports provide a closer look at sign-ins for Azure AD application activity and AD FS application activity. For more information, see .

Sign-in logs in Azure Active Directory - Microsoft Entra (10)

Azure AD Usage & insights also provides the Authentication methods activity report, which breaks down authentication by the method used. Use this report to see how many of your users are set up with MFA or passwordless authentication.

Sign-in logs in Azure Active Directory - Microsoft Entra (11)

Microsoft 365 activity logs

You can view Microsoft 365 activity logs from the Microsoft 365 admin center. Microsoft 365 activity and Azure AD activity logs share a significant number of directory resources. Only the Microsoft 365 admin center provides a full view of the Microsoft 365 activity logs.

You can access the Microsoft 365 activity logs programmatically by using the Office 365 Management APIs.

Next steps

  • Basic info in the Azure AD sign-in logs

  • How to download logs in Azure Active Directory

    (Video) User and Sign in risk policy || password Protection || Enforced vs Audit ||Azure Active Directory

  • How to access activity logs in Azure AD

Videos

1. EASY FIX: Powershell Azure AD Log In Problem with Internet Explorer - UseDeviceAuthentication
(URTechDotCa)
2. 26. Setup Passwordless sign in in Azure AD using Microsoft Authenticator App
(MSFT WebCast)
3. Provision users into on-premises applications
(Microsoft Security)
4. Introducing Microsoft Entra Workload Identities | OD28
(Microsoft Ignite)
5. Microsoft Entra Identity & Access Management
(Synergy Technical)
6. Azure Active Directory: ServiceNow Integration with Azure AD
(Microsoft Security)
Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated: 02/22/2023

Views: 6223

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.